110 likes | 135 Views
Understand the need for secure telephone identities, threats faced, and progress of STIR working group towards improving verification mechanisms for phone numbers.
E N D
STIR Secure Telephone Identity
Introduction • Context and drivers • STIR Working Group Charter • Problem Statement • Threats • Status of work • Related work and links
Context – Past and Present • Calling number used to be considered as trustworthy • it is marked as such (« network provided » / asserted identity) in the signaling • it is provided by a third party which is expected to be trustworthy. • Problem: in practice it is less and less reliable • calling party numbers may be flagged by networks as asserted and trustworthy when the upstream source is not. • there is nothing in the number or the signaling to demonstrate it is being used by an entity (provider/customer) that has ‘authority’ over that number
Drivers • Various applications assume a valid calling party number • calling line number presentation • Network functions • Fixed & mobile implicit/partial: voicemail authentication, customer support helpline • added value service routing, emergency service directory reverse-lookup • Implicit identification • User/application-level features • implicit identification for location based services (landlines). • implicit authentication: transaction confirmation TEXTs…, • Issues raised with number misappropriation/highjack • voice mail hacking, • robotcalling, aggressive telemarketing… • “vishing”: voice or VoIP phishing • uncivil practices known as “swatting” (false report of an incident to emergency services) • => STIR WG
STIR Charter • From: http://datatracker.ietf.org/wg/stir/charter/ • The STIR working group will specify Internet-based mechanisms that allow verification of the calling party's authorization to use a particular telephone number for an incoming call. • Work will produce • A problem statement detailing the deployment environment andsituations that motivate work on secure telephone identity • A threat model for the secure telephone identity mechanisms • A privacy analysis of the secure telephone identity mechanisms • A document describing the SIP in-band mechanism for telephonenumber-based identities during call setup • A document describing the credentials required to supporttelephone number identity authentication
STIR Problem Statement • From: http://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement/ • In the classical public-switched telephone network, a limited number of carriers trusted each other, without any cryptographic validation, to provide accurate caller origination information • VoIP, text messaging, Caller ID spoofing have changed the game
STIR Problem Statement • Use Cases Considered • VoIP-to-VoIP Call • IP-PSTN-IP Call • PSTN-to-VoIP Call • VoIP-to-PSTN Call • PSTN-VoIP-PSTN Call • PSTN-to-PSTN Call • Limitations of current solutions • Identity • Verification Involving PSTN Reachability • Credential handling
Threats • From: http://datatracker.ietf.org/doc/draft-ietf-stir-threats/ • Impersonation of a calling party number enables • Robocalling • Vishing • Swatting • Even more… • Attacks • Voicemail Hacking • Unsolicited Commercial Calling • Denial of Service Attacks • The work considers various use cases of how impersonation takes place and the attack vectors
Status of work • The Problem Statement document has been submitted for Publication as an Information RFC • The Threats document has another round of updates to go before being progressing to the next step toward RFC • General consensus that the signing mechanism will mimic what already exists for email-like SIP URIs john@example.com and adapt it for phone numbers: • Associate credentials with phone numbers • Define extensions in SIP to convey a “proof” that the calling ‘party’ (user/network…) has some authority over the number • Make it possible for the called party (user/network…) to verify this
Become involved! • IETF • www.ietf.org • STIR work • http://datatracker.ietf.org/wg/stir/charter/ • Mailing List • https://www.ietf.org/mailman/listinfo/stir • Meeting archive from last IETF meeting • http://www.ietf.org/proceedings/89/stir.html
Related work and links • STIR Working Group • http://datatracker.ietf.org/wg/stir/ • Charter and latest documents can be found there • M3AAWG • http://www.m3aawg.org/ • Voice and Telephony Anti-Abuse Workshop • http://www.m3aawg.org/vta-sig • Presentation given at IETF 89 in March 2014 • http://www.ietf.org/proceedings/89/slides/slides-89-stir-2.pdf